Cyber Security Budgets Are Misspent

A leading cyber security services company, Integrity360, has announced its findings from a Twitter poll to gain visibility into cyber security budgets and over surplus solutions within businesses. Their conclusion is that almost 30% of polled businesses have between 31-40 tools that are not required in their tech stack  

The poll, which was conducted between 8-10 March, found that over 30% of businesses believe that 30% of their budget is being allocated to tools and solutions that are not being used to their full potential.  

In addition, almost 30% of those surveyed agree that they have more than 31-40 tools and solutions within their tech stack that could be removed due to overlapping and unused features. This is a worrying figure when cyber security breaches continue to rise, and businesses are left with gaps that could give cyber attackers a route in. 

The CTO of Integrity360, Richard Ford, commented: “Whilst businesses recognise the need to allocate more budget towards cyber security, the difficulty lies in knowing where to apportion the spend...  It’s easy to throw money at all the shiny new tech and solutions on the market, but this results in disparate systems, with too many tools deployed for specific purposes, that ultimately go unmanaged and underutilised.” 

Furthermore, 46% of polled respondents believe the most damaging impact of a cyber security breach to be the consequential financial damage.

“Businesses need a cyber security strategy that provides full visibility over their tech stack and the solutions they have, those they need and those they can do without... An overabundance of solutions with features that overlap or aren’t required, is an accident waiting to happen, and a drain on budget and efficiency”, Ford commented. 

At a time of economic downturn when cyber security budgets are tight and risks are heightened, spending money on unnecessary and unused solutions is a business risk. Action to get rid of outdated systems, to consolidate different platforms and convergence of technologies us the best way optimise spending as well as improving overall security posture, according to Ford. 

 

You Might Also Read: 

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« World Backup Day 
Bitbucket Backup Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

FastPassCorp

FastPassCorp

In the world of IT, identity theft is a growing concern. FastPass offers an innovative solution as a cloud or on-premises offering.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.